PicketLink alternatives and similar libraries
Based on the "Security" category.
Alternatively, view PicketLink alternatives based on common mentions on social networks and blogs.
9.5 9.9 L2 PicketLink VS KeycloakOpen Source Identity and Access Management For Modern Applications and Services
8.7 9.7 L5 PicketLink VS CryptomatorMulti-platform transparent client-side encryption of your files in the cloud
7.5 9.6 L4 PicketLink VS pac4jSecurity engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
6.8 6.6 PicketLink VS jCasbinAn authorization library that supports access control models like ACL, RBAC, ABAC in Java
6.2 7.2 L3 PicketLink VS Themis by Cossack LabsEasy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
3.0 0.0 L1 PicketLink VS OACC FrameworkOACC (Object ACcess Control) is an advanced Java Application Security Framework
2.1 0.0 PicketLink VS Nimbus JOSE+JWTJSON Web Token (JWT) implementation for Java with support for signatures (JWS), encryption (JWE) and web keys (JWK).
Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of PicketLink or a related project?
- Java EE Application Security
- Identity Management
- REST Security
- Standard-based Security
This repository is no longer maintained
This repository is no longer maintained and is archived. For more details, please take a look at http://picketlink.org/keycloak-merge-faq.
Ensure you have JDK 7 (or newer) installed
If you already have Maven 3.1.0 (or newer) installed you can use it directly
mvn clean install
Running the Testsuite
All tests are enabled by default whe you execute a simple
mvn clean install
Some modules provide specific profiles and system properties in order to run a specific set of integration or unit tests.
During a build (if tests are not skipped) the integration tests from tests are always executed.
Running the PicketLink IDM Testsuite
For PicketLink IDM, the following profiles are available:
- idm-smoke-tests: Core tests that should be run as part of every build. Failures here will fail the build.
You also provide some additional system properties as follows:
- -Dtest.idm.configuration=[all,file,jpa,ldap,jdbc,ldap_jpa]: Specify which category of tests should be run. Usually, they are references to specific configurations for each identity store.
- -Dtest.idm.jpa.eclipselink.provider=true: Use EclipseLink instead of Hibernate when running the JPA identity store configuration tests.
Nightly Builds are available at http://repository-picketlink.forge.cloudbees.com/snapshot/.
Note: Those artitacts are SNAPSHOT versions, they're only suitable to test new features, fixes, etc.
*Note that all licence references and agreements mentioned in the PicketLink README section above are relevant to that project's source code only.